Third-Party Access Risks Explained

Third-Party Access Risks Explained

Attackers are going after third-party contractors, using their legitimate access to the targets and exploiting security gaps to break in and make off with their ill-gotten goods. But what is it about the ...

Lapsus$’s Breaches — A Wake Up Call for Defense of Identity in Depth

Okta, Uber, Rockstar, Samsung, Microsoft, Ubisoft, and others have all found themselves in the headlines for having been breached by the Lapsus$ crew. Claiming to be a couple of teens, this group ...

Lessons Learned from Twitter Security Disclosures

In January, Twitter confused the security world by firing their head of security Peiter Zatko — or as he is more commonly known in security circles, Mudge. The severing of ties came ...

Product Update Release Announcement for New REST API Framework and Webhooks 

Today, Authomize announced that we have released an updated version of our REST API framework to enable our customers to connect Authomize’s Cloud Identity and Access Security Platform throughout their environments.  The ...
Okta Breach Mitigation and Updates

Okta Breach Mitigation and Updates

According to reports, authentication and Identity and Access Management (IAM) solutions provider Okta was breached by the Lapsus$ hacking group... The post Okta Breach Mitigation and Updates appeared first on Authomize ...

Ubiquiti’s Insider Attack is a Textbook Case for Stronger Authorization Security Management

Stories about hacking usually involve some shady characters and a bit of skullduggery. In most cases, it’s just criminal or state actors being... The post Ubiquiti’s Insider Attack is a Textbook Case ...